SlideShare a Scribd company logo
STUDENT NAME:
• AKSHAY PATIL
• AJIT KARANJKAR
• SUYASH GHATE
• DHAVAL AHIR
Secure and Efficient Data Transmission for
Cluster-based Wireless Sensor Networks
GUIDED BY
Prof. P.P.Gawali
1
CONTENTS:
 INTRODUCTION
 NETWORK ARCHITECTURE
 LITERATURE SURVEY
 OBJECTIVE
 PROPOSED SYSTEM
 MATHEMATICAL MODEL
 DIAGRAM
 SOFTWARE & HARDWARE REQUIREMENT
 CONCLUSION
 REFERENCES
2
INTRODUCTION:
Wireless sensor network (WSN) is a network system comprised of
spatially distributed devices using wireless sensor nodes to monitor
physical or environmental conditions, such as sound, temperature,
and motion
Clustering is an effective and practical way to enhance the system
performance of WSNs. Clusters are formed dynamically and
periodically.
Secure and Efficient data transmission is thus especially necessary
and is demanded in many such practical WSNs.
3
NETWORK ARCHITECTURE:
4
Fig. 1 Network Architecture
LITERATURE SURVEY:
 The Author Abbasi and M. Younis proposed “A Survey on Clustering Algorithms for Wireless
Sensor Networks ,” system.
In this system Clustering is introduced to WSNs because it has proven to be an effective approach to
provide better data aggregation and scalability for large WSNs.
 S. Sharma and S.K. Jena, proposed a system “A Survey on Secure Hierarchical Routing
Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security
(ICCCS), pp. 146-151, 2011.
In this technique Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient
among other routing protocols.
5
CONTINUED……
 The Author R. Yasmin, E. Ritter, and G. Wang, “Authentication Framework for
Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l
Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.
The system authentication is a crucial security requirement to avoid attacks
against secure communication, and to mitigate DoS attacks exploiting the limited
resources of sensor nodes.
 The Author K. Pradeepa, W. R. Anne, and S. Duraisamy, Proposed a system
“Design and Implementation Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.
In this system Clustering in Wireless Sensor Network, Design Issues in Clustering,
and Implementation Issues in Clustering.
6
OBJECTIVE :
 The objective of the secure data transmission for cluster
based wireless sensor network( CWSN) is to guarantee a
secure and efficient data transmission between leaf nodes
and cluster head(CH), as well as transmission between
cluster head(CH) and the base station(BS)
• Reduce Operation Time.
• Data security.
• Reduce the computation and storage cost
7
PROPOSED SYSTEM :
8
 In Proposed System, there are two proposed Secure and Efficient data
Transmission (SET) protocols called SET-IBS and SET-IBOOS, by using
the Identity-Based digital Signature (IBS) scheme and the Identity-Based
Online/Offline digital Signature (IBOOS) scheme, respectively.
 The key idea of both SET-IBS and SET-IBOOS protocol is to authenticate
the encrypted sensed data by applying digital signature to message which
are efficient in communication and applying the key management for
security
 It has been proposed in order to reduce the computation and storage costs
MATHEMATICAL MODEL :
9
10
11
12
UML(Unified Modelling Language)
Diagrams
13
Fig. 2 Activity diagram
ACTIVITY DIAGRAM
14 Fig. 3 Use Case Diagram
USE CASE DIAGRAM
15
Fig. 4 Sequence Diagram
SEQUENCE DIAGRAM
16
Fig. 5 Class Diagram
CLASS DIAGRAM
17 Fig. 6 State Chart Diagram
STATE CHART DIAGRAM
PERT DIAGRAM:
18
Task
Year 2015-16
Jul Aug Sep Oct Nov Dec Jan Fe
b
Mar
Literature
Study
Requirement
Gathering
Analysis
Design
Implementation
Testing
Final Project
Documentation
SOFTWARE &HARDWARE :
 Software  Hardware
 Operating system : -
Windows 7 OS
 Coding Language : java
 IDE: Net beans
 Simulation tool :
OMNeT++ 3.0
 System : Dual core
processor
 Hard Disk : 40 GB.
 Ram : 1 GB
19
CONCLUSION :
20
 In this project two Secure and Efficient Data
Transmission (SET) protocols for cluster based wireless
sensor network (CWSN), called SET-IBS and SET-
IBOOS, by using the identity-based digital signature (IBS)
scheme and the identity-based online/offline digital
signature (IBOOS) scheme, respectively.
 The results show that the proposed protocols have better
performance than the existing secure protocols for
CWSNs, in terms of security overhead and energy
consumption.
REFERENCE:
 T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor
Network Technologies for the Info. Explosion Era, Stud. Comput.
Intell. Springer-Verlag, 2010, vol. 278.
 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security
Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts.,
vol. 8, no. 2, 2006.
 A. A. Abbasi and M. Younis, “A survey on clustering algorithms for
wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15,
2007.
• L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACH-On the
security of clustered sensor networks,” Signal Process., vol. 87,
2007.
• P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance
analysis of a secure clustering protocol for sensor networks,” in Proc.
21
22
 K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol
for Cluster-Based
Wireless Sensor Networks Using Group Key Management,” in
Proc. WiCOM, 2008.
 R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework
for Wireless Sensor Networks Using Identity-Based Signatures,”
Proc. IEEE Int’l Conf. Computer and Information Technology
(CIT), pp. 882-889, 2010.
 S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical
Routing Protocols in Wireless Sensor Networks,” Proc. Int’l
Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
 K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and
Implementation Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.
THANK
YOU
23

More Related Content

What's hot

Smart Energy Management
Smart Energy ManagementSmart Energy Management
Smart Energy Management
Marie-Paule Odini
 
Smart home
Smart homeSmart home
Smart homeNhat Loc
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
Areej Qasrawi
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
Tanujkumar101
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network
Shashank Narayan
 
傾向スコアでみる ソーシャルネットワーク分析
傾向スコアでみる ソーシャルネットワーク分析傾向スコアでみる ソーシャルネットワーク分析
傾向スコアでみる ソーシャルネットワーク分析Hiroko Onari
 
Ancel Battery System Tester BST500 User Manual
Ancel Battery System Tester BST500 User ManualAncel Battery System Tester BST500 User Manual
Ancel Battery System Tester BST500 User Manual
Tim Miller
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
 
Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...
Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...
Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...
IRJET Journal
 
Iso 19011 2018
Iso 19011 2018Iso 19011 2018
Iso 19011 2018
Patriciasol5
 
Summer training on matlab
Summer training on matlabSummer training on matlab
Summer training on matlab
dangerahad
 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET Journal
 

What's hot (12)

Smart Energy Management
Smart Energy ManagementSmart Energy Management
Smart Energy Management
 
Smart home
Smart homeSmart home
Smart home
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network
 
傾向スコアでみる ソーシャルネットワーク分析
傾向スコアでみる ソーシャルネットワーク分析傾向スコアでみる ソーシャルネットワーク分析
傾向スコアでみる ソーシャルネットワーク分析
 
Ancel Battery System Tester BST500 User Manual
Ancel Battery System Tester BST500 User ManualAncel Battery System Tester BST500 User Manual
Ancel Battery System Tester BST500 User Manual
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...
Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...
Implementation of FPGA Based Image Processing Algorithm using Xilinx System G...
 
Iso 19011 2018
Iso 19011 2018Iso 19011 2018
Iso 19011 2018
 
Summer training on matlab
Summer training on matlabSummer training on matlab
Summer training on matlab
 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep Learning
 

Similar to Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
IEEEFINALSEMSTUDENTSPROJECTS
 
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Dr. Amarjeet Singh
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
chennaijp
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
Sai Sirisha
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
IJAAS Team
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET Journal
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
IJTET Journal
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
IJECEIAES
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
Gopal Mulgund
 

Similar to Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks (20)

Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 

Recently uploaded

14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

  • 1. STUDENT NAME: • AKSHAY PATIL • AJIT KARANJKAR • SUYASH GHATE • DHAVAL AHIR Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks GUIDED BY Prof. P.P.Gawali 1
  • 2. CONTENTS:  INTRODUCTION  NETWORK ARCHITECTURE  LITERATURE SURVEY  OBJECTIVE  PROPOSED SYSTEM  MATHEMATICAL MODEL  DIAGRAM  SOFTWARE & HARDWARE REQUIREMENT  CONCLUSION  REFERENCES 2
  • 3. INTRODUCTION: Wireless sensor network (WSN) is a network system comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and motion Clustering is an effective and practical way to enhance the system performance of WSNs. Clusters are formed dynamically and periodically. Secure and Efficient data transmission is thus especially necessary and is demanded in many such practical WSNs. 3
  • 4. NETWORK ARCHITECTURE: 4 Fig. 1 Network Architecture
  • 5. LITERATURE SURVEY:  The Author Abbasi and M. Younis proposed “A Survey on Clustering Algorithms for Wireless Sensor Networks ,” system. In this system Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.  S. Sharma and S.K. Jena, proposed a system “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. In this technique Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols. 5
  • 6. CONTINUED……  The Author R. Yasmin, E. Ritter, and G. Wang, “Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010. The system authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes.  The Author K. Pradeepa, W. R. Anne, and S. Duraisamy, Proposed a system “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012. In this system Clustering in Wireless Sensor Network, Design Issues in Clustering, and Implementation Issues in Clustering. 6
  • 7. OBJECTIVE :  The objective of the secure data transmission for cluster based wireless sensor network( CWSN) is to guarantee a secure and efficient data transmission between leaf nodes and cluster head(CH), as well as transmission between cluster head(CH) and the base station(BS) • Reduce Operation Time. • Data security. • Reduce the computation and storage cost 7
  • 8. PROPOSED SYSTEM : 8  In Proposed System, there are two proposed Secure and Efficient data Transmission (SET) protocols called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively.  The key idea of both SET-IBS and SET-IBOOS protocol is to authenticate the encrypted sensed data by applying digital signature to message which are efficient in communication and applying the key management for security  It has been proposed in order to reduce the computation and storage costs
  • 10. 10
  • 11. 11
  • 13. 13 Fig. 2 Activity diagram ACTIVITY DIAGRAM
  • 14. 14 Fig. 3 Use Case Diagram USE CASE DIAGRAM
  • 15. 15 Fig. 4 Sequence Diagram SEQUENCE DIAGRAM
  • 16. 16 Fig. 5 Class Diagram CLASS DIAGRAM
  • 17. 17 Fig. 6 State Chart Diagram STATE CHART DIAGRAM
  • 18. PERT DIAGRAM: 18 Task Year 2015-16 Jul Aug Sep Oct Nov Dec Jan Fe b Mar Literature Study Requirement Gathering Analysis Design Implementation Testing Final Project Documentation
  • 19. SOFTWARE &HARDWARE :  Software  Hardware  Operating system : - Windows 7 OS  Coding Language : java  IDE: Net beans  Simulation tool : OMNeT++ 3.0  System : Dual core processor  Hard Disk : 40 GB.  Ram : 1 GB 19
  • 20. CONCLUSION : 20  In this project two Secure and Efficient Data Transmission (SET) protocols for cluster based wireless sensor network (CWSN), called SET-IBS and SET- IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively.  The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
  • 21. REFERENCE:  T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Info. Explosion Era, Stud. Comput. Intell. Springer-Verlag, 2010, vol. 278.  Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, 2006.  A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, 2007. • L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACH-On the security of clustered sensor networks,” Signal Process., vol. 87, 2007. • P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance analysis of a secure clustering protocol for sensor networks,” in Proc. 21
  • 22. 22  K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” in Proc. WiCOM, 2008.  R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework for Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.  S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.  K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.